97361355
Apr 13, 2022
Downloadable and recorded computer software disaggregation platform, designed to remove any hardware dependency; Downloadable and recorded cloud-based software for networking management and security solutions, namely, software for secured transmission of information and data, for accessing and using a cloud and for enabling protected connectivity between branches; Downloadable and recorded cloud-based software for providing secure network connectivity solutions; Downloadable and recorded cloud network monitoring software; Cloud computer servers for secured web hosting and network connectivity; Downloadable and recorded software for ensuring computer security
Electrical and Scientific ApparatusPromoting the use of the security assurance best practices of others in the field of cloud computing; Business administration and management consultancy in the field of connectivity technology
Advertising and BusinessMulti-cloud-based electronic data protection services, namely, data security consultancy as to data security, encryption, and secure data processing; Providing online non-downloadable software for supporting secured network connectivity solutions, defined wide area networking and secure access technologies; Computer services, namely, cloud hosting provider and electronic data storage services; Consulting services in the field of cloud computing; Computer services, namely, cloud hosting provider services provided near the geographical location of the end user; Cloud-stored data protection services, namely, providing data security services through software-defined connectivity solution for extant service providers; Cloud-hosted data protection services, namely, providing data security services through software-defined connectivity solution for extant service providers; Cloud-based data protection services, namely, data security consultancy services; Cloud storage services for electronic files; Computer services, namely, providing web servers and co-location servers to third party cloud computing and data storage facilities; Computer, data and Internet security services, including consultancy, namely, restricting unauthorized network access by outsiders and unauthorized users; Computer security consultancy in the field of security software; Monitoring of computer systems for security purposes, namely, computer security threat analysis for protecting data
Computer and Scientific